From: Low-rate DoS attack detection based on two-step cluster analysis and UTR analysis
Device | Operate system | Software | Function |
---|---|---|---|
Legitimate User 1 | Windows 7 | Python socket | Legitimate user sending network traffic |
Legitimate User 2 | Windows 7 | Python socket | Legitimate user sending network traffic |
Legitimate User 3 | Windows 7 | Python socket | Legitimate user sending network traffic |
Attacker | Windows 7 | Python socket | LDoS attacker |
Server | Windows 7 | Python socket | Server receiving network traffic |
Router1 | – | Routing Protocol | Forwarding packets |
Router2 | – | Routing Protocol | Forwarding packets |